55-----
66
77This module has been built as a replacement for the aging mod_auth_kerb.
8- It's aim is to use only GSSAPI calls and be as much as possible agnostic
8+ Its aim is to use only GSSAPI calls and be as much as possible agnostic
99of the actual mechanism used.
1010
1111Dependencies
@@ -17,15 +17,15 @@ extension](http://k5wiki.kerberos.org/wiki/Projects/Credential_Store_extensions)
1717is necessary to achieve full functionality. Reduced functionality is
1818provided without these extensions.
1919
20- krb5 (>=1.11)
21- Apache (>=2.4)
20+ krb5 (>=1.11)
21+ Apache (>=2.4)
2222
2323Installation
2424------------
2525
26- ./configure
27- make
28- make install
26+ ./configure
27+ make
28+ make install
2929
3030
3131Configuration
@@ -41,12 +41,12 @@ The simplest configuration scheme specifies just one directive, which is the
4141location of the keytab.
4242
4343#### Example
44- <Location /private>
45- AuthType GSSAPI
46- AuthName "GSSAPI Single Sign On Login"
47- GssapiCredStore keytab:/etc/httpd.keytab
48- Require valid-user
49- </Location>
44+ <Location /private>
45+ AuthType GSSAPI
46+ AuthName "GSSAPI Single Sign On Login"
47+ GssapiCredStore keytab:/etc/httpd.keytab
48+ Require valid-user
49+ </Location>
5050
5151Your Apache server need read access to the keytab configured.
5252If your Kerberos implementation does not support the credential store
@@ -62,7 +62,7 @@ Configuration Directives
6262Forces the authentication attempt to fail if the connection is not being
6363established over TLS
6464
65- Example:
65+ #### Example
6666 GssapiSSLonly On
6767
6868
@@ -78,7 +78,7 @@ When this options is used the resolved name is set in the REMOTE_USER variable
7878however the complete client principal name is also made available in the
7979GSS_NAME variable.
8080
81- Example:
81+ #### Example
8282 GssapiLocalName on
8383
8484
@@ -90,15 +90,15 @@ the connection in order to keep the state between round-trips. With this option
9090enable incomplete context are store in the connection and retrieved on the next
9191request for continuation.
9292
93- Example:
93+ #### Example
9494 GssapiConnectionBound On
9595
9696
9797### GssapiSignalPersistentAuth
9898For clients that make use of Persistent-Auth header, send the header according
9999to GssapiConnectionBound setting.
100100
101- Example:
101+ #### Example
102102 GssapiSignalPersistentAuth On
103103
104104
@@ -116,7 +116,7 @@ See the
116116[mod_sessions](http://httpd.apache.org/docs/current/mod/mod_session.html)
117117documentation for more information.
118118
119- Example:
119+ #### Example
120120 GssapiUseSessions On
121121 Session On
122122 SessionCookieName gssapi_session path=/private;httponly;secure;
@@ -126,15 +126,15 @@ Example:
126126
127127When GssapiUseSessions is enabled a key use to encrypt and MAC the session
128128data will be automatically generated at startup, this means session data will
129- become unreadable if the server is restarted or multiple serves are used and
129+ become unreadable if the server is restarted or multiple servers are used and
130130the client is load balanced from one to another. To obviate this problem the
131131admin can choose to install a permanent key in the configuration so that
132132session data remain accessible after a restart or by multiple servers
133133sharing the same key.
134134
135135The key must be a base64 encoded raw key of 32 bytes of length.
136136
137- Example:
137+ #### Example
138138 GssapiSessionKey key:VGhpcyBpcyBhIDMyIGJ5dGUgbG9uZyBzZWNyZXQhISE=
139139
140140
@@ -143,7 +143,7 @@ Example:
143143The GssapiCredStore option allows to specify multiple credential related
144144options like keytab location, client_keytab location, ccache location etc.
145145
146- Example:
146+ #### Example
147147 GssapiCredStore keytab:/etc/httpd.keytab
148148 GssapiCredStore ccache:FILE:/var/run/httpd/krb5ccache
149149
@@ -156,13 +156,13 @@ The delegated credentials will be stored in a file named after the client
156156principal and the subprocess environment variable KRB5CCNAME will be set
157157to point to that file.
158158
159- Example:
159+ #### Example
160160 GssapiDelegCcacheDir /var/run/httpd/clientcaches
161161
162-
163162A user foo@EXAMPLE.COM delegating its credentials would cause the server to
164163create a ccache file named /var/run/httpd/clientcaches/foo@EXAMPLE.COM
165164
165+
166166### GssapiUseS4U2Proxy
167167
168168Enables the use of the s4u2Proxy Kerberos extension also known as
@@ -174,14 +174,14 @@ This options requires GssapiDelegCcacheDir to be set. The ccache will be
174174populated with the user's provided ticket which is later used as evidence
175175ticket by the application.
176176
177- Example:
177+ #### Example
178178 GssapiUseS4U2Proxy On
179179 GssapiCredStore keytab:/etc/httpd.keytab
180180 GssapiCredStore client_keytab:/etc/httpd.keytab
181181 GssapiCredStore ccache:FILE:/var/run/httpd/krb5ccache
182182 GssapiDelegCcacheDir /var/run/httpd/clientcaches
183183
184- NOTE: The client keytab is necessary to allow GSSAPI to initate via keytab
184+ ** NOTE:** The client keytab is necessary to allow GSSAPI to initiate via keytab
185185on its own. If not present an external mechanism needs to kinit with the
186186keytab and store a ccache in the configured ccache file.
187187
@@ -191,19 +191,19 @@ Allows the use of Basic Auth in conjunction with Negotiate.
191191If the browser fails to use Negotiate is will instead fallback to Basic and
192192the username and password will be used to try to acquire credentials in the
193193module via GSSAPI. If credentials are acquire successfully then they are
194- validated agaist the server's keytab.
194+ validated against the server's keytab.
195195
196- Enable with: GssapiBasicAuth On
197- Default: GssapiBasicAuth Off
196+ - ** Enable with:** GssapiBasicAuth On
197+ - ** Default:** GssapiBasicAuth Off
198198
199- Example:
200- <Location /gssapi>
201- AuthType GSSAPI
202- AuthName "Login"
203- GssapiBasicAuth On
204- GssapiCredStore keytab:/etc/httpd/http.keytab
205- Require valid-user
206- </Location>
199+ #### Example
200+ <Location /gssapi>
201+ AuthType GSSAPI
202+ AuthName "Login"
203+ GssapiBasicAuth On
204+ GssapiCredStore keytab:/etc/httpd/http.keytab
205+ Require valid-user
206+ </Location>
207207
208208
209209### GssapiAllowedMech
@@ -213,19 +213,19 @@ can be used when credentials for multiple mechanisms are available.
213213By default no mechanism is set, this means all locally available mechanisms
214214are allowed. The recognized mechanism names are: krb5, iakerb, ntlmssp
215215
216- Example:
216+ #### Example
217217 GssapiAllowedMech krb5
218218 GssapiAllowedMech ntlmssp
219219
220220
221221### GssapiBasicAuthMech
222222
223223List of mechanisms against which Basic Auth is attempted. This is useful to
224- restrict the mechanisms that can be used to attaempt password auth.
224+ restrict the mechanisms that can be used to attempt password auth.
225225By default no mechanism is set, this means all locally available mechanisms
226226are allowed, unless GssapiAllowedMech is set, in which case those are used.
227- GssapiBasicAuthMech always takes precendence over GssapiAllowedMech.
227+ GssapiBasicAuthMech always takes precedence over GssapiAllowedMech.
228228The recognized mechanism names are: krb5, iakerb, ntlmssp
229229
230- Example:
230+ #### Example
231231 GssapiBasicAuthMech krb5
0 commit comments